Information security – Access control or authentication – Authorization
Reexamination Certificate
2001-05-04
2008-10-07
Barron, Jr., Gilberto (Department: 2132)
Information security
Access control or authentication
Authorization
C726S004000, C726S017000, C709S229000, C707S793000
Reexamination Certificate
active
07434257
ABSTRACT:
A dynamic authorization callback mechanism is provided that implements a dynamic authorization model. An application can thus implement virtually any authorization policy by utilizing dynamic data and flexible policy algorithms inherent in the dynamic authorization model. Dynamic data, such as client operation parameter values, client attributes stored in a time-varying or updateable data store, run-time or environmental factors such as time-of-day, and any other static or dynamic data that is managed or retrievable by the application may be evaluated in connection with access control decisions. Hence, applications may define and implement business rules that can be expressed in terms of run-time operations and dynamic data. An application thus has substantial flexibility in defining and implementing custom authorization policy, and at the same time provides standard definitions for such dynamic data and policy.
REFERENCES:
patent: 5321841 (1994-06-01), East et al.
patent: 6308273 (2001-10-01), Goertzel et al.
patent: 6366913 (2002-04-01), Fitler et al.
patent: 6412070 (2002-06-01), Van Dyke et al.
patent: 6591265 (2003-07-01), Erickson et al.
patent: 6754829 (2004-06-01), Butt et al.
patent: 7216345 (2007-05-01), Porter
patent: 2002/0010768 (2002-01-01), Marks et al.
Hadfield L., et al, “Window NT Server 4 Security Handbook”, 1997, QUE Corporation, pp. 79-86, 225-236.
Thomas, R. K. et al, “Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management”, 1997, Proceeding of the IFIPWG11.3 Workshop on Database Security.
“Securing and Managing Web Resources with IBM SecureWay Policy Director—White Paper”, IBM, Mar. 1999, Retrieved from the Internet on Jul. 13, 2006: <URL:http://www.-03.ibm.com/security/library/wp—policy-dir.shtml>.
Kassab, L.L. et al., “Towards formalizing the Java security architecture of JDK 1.2,”Computer Security—ESORICS 98. 5thEuropean Symposium on Research in Computer Security, published by Springer-Verlag, Berlin, Germany, Quisquater, J-J. et al. (eds.), Louvain-la-Neuve, Belgium, Sep. 16-18, 1998, 191-207.
Sandhu, R.S. et al., “Some owner based schemes with dynamic groups in the schematic protection model,”Proceedings of the 1986 IEEE Symposium on Security and Privacy, published by IEEE Computer Soc. Press, Oakland, CA, Apr. 7-9, 1986, 61-70.
Bai, Y. et al., “A language for specifying sequences of authorization transformations and its applications,”Information and Communications Security. First International Conference, ICIS '97, published by Springer-Verlag, Berlin, Germany, Beijing, China, Nov. 11-14, 1997, 39-49.
Netegrity, “SiteMinder Delivers Industry-Leading Performance, Scalability, and Reliability,” Netegrity White Paper, Dec. 1999, 5 pages.
Dubhashi Kedarnath A.
Garg Praerit
Hamblin Jeffrey B.
Hopkins Anne C.
Reichel Robert P.
Barron Jr. Gilberto
Dinh Minh
Microsoft Corporation
Woodcock & Washburn LLP
LandOfFree
System and methods for providing dynamic authorization in a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and methods for providing dynamic authorization in a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and methods for providing dynamic authorization in a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3988249